In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 2.0.30 |
||
linux linux kernel 2.0.37 |
||
linux linux kernel 2.0.36 |
||
linux linux kernel 2.0.35 |